Hunt
Dynamic crypto maps are used when we don't know ahead of time some of the
parameters for the SA or IKE associations to be made. This would be the case
if someone is ringing in from home and it is not a device (router, firewall)
to device(router, firewall) situation where the parameters can b
OK it all depends on when you use dynamic crypto maps and the rule is that
dynamic maps are used for remote users who need occasional access and for
whom you do not have all the necessary information to create a staic crypto
map, sich as IP address.
So
a. You always create dynamic crypto maps w
I am very confused with the following Crypto Map question:
In the MCNS book (by Cisco Press), it said that if a static crypto map entry
sees outbound IP traffic that should be protected and the crypto map
specifies the use of IKE, then a Security Assoication is negotiated with the
remote peer acc
3 matches
Mail list logo